Blog Posts

  • Unlocking the Windows Registry: A Digital Forensics Goldmine

    Author: Heidi Pohlman Unearth hidden evidence with the power of the Windows Registry Why isn’t my computer working correctly? If you have a Windows OS, the answer might be in the Windows registry. If you don’t, you’re probably using a Mac OS, which doesn’t have this powerful system directory.  What is the Windows Registry, and…

  • Ethical Constraints of AI

    Author: Lily Nelsen AI Overview: Generative Artificial Intelligence (GAI) is taking the world by storm, 44% of Americans interact with AI as of December 12, 2024, and that number is steadily increasing. [1] With AI development operating at lightning speed, the US government has been hesitant to derail progress with limiting statutes. So what does…

  • Understanding Cyber Laws and Regulations

    April 20th, 2024Author: Annabel Otutu Introduction The advancement of technology and the increasing reliance on digital platforms has created benefits as well as opportunities. This digital revolution has also given rise to challenges, such as cybercrime, data breaches, and online fraud. To address these concerns and ensure a secure digital environment, governments around the world…

  • Deep Fakes

    Deepfakes: Navigating the Fine Line Between Reality and DeceptionApril 5th 2024Author: Lily Pouliot What are Deepfakes? Deepfakes are instances where powerful techniques from machine learning (ML) and artificial intelligence (AI) are leveraged to manipulate or generate visual and audio content with a high potential to deceive.  These artificial images or videos are generated through a…

  • Exploring Cybersecurity Paths

    March 24th, 2024Author: Annabel Otutu Cybersecurity is a field that is often covered in mystery. Often, people don’t know the reach of cybersecurity or where it applies to. Cybersecurity is a part of many modern-day lives; from smart homes to our mobile phones. Nowadays our cars have enough computing power to be considered ‘smart’. What…

  • Understanding The OSI Model

    Concept The Open Systems Interconnection model (OSI model) is a framework to describe the seven (or more) abstraction layers on which communication between devices occurs. These layers, from bottom to top, are as follows:   Each layer serves a specific purpose within a greater systematic approach to networking and network security. Each layer builds on the…

  • The Tool for the Creative: Steganography

    How Messages are Hidden in Images. Author: Kenneth Moran

  • What Exactly Is A Digital Footprint?

    Nothing can be erased forever. Author: Rune Seregina

  • The Creeper Virus

    I’m the creeper; catch me if you can! Author: Clare McCaffrey

  • Information Gathering and Ethical Hacking

    Ethical Hacking Fundamentals: Exploring Information Gathering Techniques By: Ryan Morrissey and Annabel Otutu